37
1 The Information Sensitivity of a Security * Tri Vi Dang Columbia University Gary Gorton Yale and NBER Bengt Holmström MIT and NBER First Version: June 2011 This Version: March 2015 Abstract In this paper we introduce a new characteristic of a security, its “information sensitivity” (IS). This measure has two components, the first component measures a security’s expected monetary loss in low payoff states relative to its price (“tail risks”) and the other component measures the expected monetary profit in high payoff states. We apply this measure in different illustrative applications. (i) IS captures the incentive of an agent to produce information about the payoff of the security. (ii) We use IS to solve an optimal security design problem and show that it is optimal for a buyer to purchase debt when he faces a seller who can acquire information and there is never information acquisition in equilibrium. Even if information cost is zero the optimal debt contract makes the seller indifferent between acquiring and not acquiring information. (iii) We use IS to formalize the notion that it is easier to buy than to sell a security. (iv) IS can explain the optimality of securitization. (v) IS is a sufficient statistic for expected utility maximization and a pricing factor if agents have a linear reference point utility function. * Parts of this paper were previously contained in an earlier version of Dang, Gorton and Holmström (2010) entitled “Ignorance, Debt and Financial Crisis”.

The Information Sensitivity of a Securitytd2332/Paper_Sensitivity.pdfIS to solve an optimal security design problem and show that it is optimal for a buyer to purchase debt ... with

  • Upload
    hoangtu

  • View
    216

  • Download
    2

Embed Size (px)

Citation preview

1

The Information Sensitivity of a Security*

Tri Vi Dang

Columbia University

Gary Gorton

Yale and NBER

Bengt Holmström

MIT and NBER

First Version: June 2011

This Version: March 2015

Abstract

In this paper we introduce a new characteristic of a security, its “information sensitivity” (IS). This

measure has two components, the first component measures a security’s expected monetary loss in

low payoff states relative to its price (“tail risks”) and the other component measures the expected

monetary profit in high payoff states. We apply this measure in different illustrative applications. (i) IS

captures the incentive of an agent to produce information about the payoff of the security. (ii) We use

IS to solve an optimal security design problem and show that it is optimal for a buyer to purchase debt

when he faces a seller who can acquire information and there is never information acquisition in

equilibrium. Even if information cost is zero the optimal debt contract makes the seller indifferent

between acquiring and not acquiring information. (iii) We use IS to formalize the notion that it is

easier to buy than to sell a security. (iv) IS can explain the optimality of securitization. (v) IS is a

sufficient statistic for expected utility maximization and a pricing factor if agents have a linear

reference point utility function.

* Parts of this paper were previously contained in an earlier version of Dang, Gorton and Holmström (2010)

entitled “Ignorance, Debt and Financial Crisis”.

2

1. Introduction

Stochastic moments like mean and variance are important characteristics of securities. In this

paper we introduce another characteristic of a security, its “information sensitivity” (IS). IS

has two components, the first component measures a security’s expected monetary loss in low

payoff states relative to its price (“tail risks”) and the other component measures the expected

monetary profit in high payoff states. We employ this measure in different applications. In a

trading context, we show that IS captures the incentive of an agent to produce private

information about the payoff of a security. We analyze optimal security design with

endogenous private information production. We use IS to formalize the notion that it is easier

to buy than to sell a security. We examine the optimality of securitization using the concept of

IS. In a portfolio choice and asset pricing setting, we show that IS is a sufficient statistic for

expected utility maximization and a pricing factor if agents have a linear reference point

utility function.

Consider an agent who buys a security for price p. The payoff of the security is s(x) and

backed by an asset x where x is a random variable with density f(x).1 If ex post s(x)<p, then

the buyer incurs a loss of p-s(x). By integrating over all x where s(x)<p we can determine the

expected loss of the buyer in low payoff states. We define πL(·)=∫max[p-s(x),0]f(x)dx as the

information sensitivity of a security in the loss region. If s(x)>p, then the buyer makes a profit

of s(x)-p. We define the IS in the profit region as πR(·)=∫max[s(x)-p,0]f(x)dx which measures

the expected monetary profit of a security in high payoff states. See Figure 1 for an

illustration showing πL and πR. The two measures are identical if p=E[s(x)].

Figure 1

1 For example, if s(x) is an AAA-rated mortgage-backed security then s(x) is senior debt backed by the payoff of

a pool of underlying mortgages.

3

Dang, Gorton and Holmström (2012) show that if a risk neutral buyer can produce

information about x which backs the security payoff s(x), then information sensitivity

measures the value of information. If p≤E[s(x)], then the value of information for the buyer is

given by πL. In other words, πL captures the expected loss an informed buyer can avoid by not

trading in low payoff states. If p≥E[s(x)], the value of information is πR. Without information,

an uninformed buyer does not trade. πR captures the expected profit an informed buyer can

make by trading in high payoff states. At p=E[s(x)], πL=πR. In the present paper we extend

this result and show that the value of information is V=min{πL,πH} and the same whether the

agent is a buyer or seller of the security and for any prices.

Dang, Gorton and Holmström (2012) also show that debt minimizes the value of information

or the IS of a security. In this paper we give a complete characterization of the properties of

IS. In addition, we derive the complete set of securities that minimizes πL and πR. The only

restriction we impose on the set of securities (functions) is limited liability, i.e. s(x)≤x for all

x. Among all securities with the same expected payoff E[s(x)], we show that any security with

s(x)=x for all x<p minimizes both πL and πR for all prices p and any distribution F(x). We call

such a security quasi-debt which is a security with “slope 1” up to the price and then can

fluctuate arbitrary but never falls below the price for x>p. Debt is a special case of quasi debt.

See Figure 2 below for an illustration. This result shows that it is not the “flat part” of debt

that makes it least information sensitive but the key is seniority of payments in low payoff

states.

We provide several applications of IS to illustrate its usefulness. First, we employ IS to solve

an optimal security design problem with endogenous information acquisition. What is the

optimal contract (p,s(x)) that an uninformed buyer proposes if he faces a seller who can

choose to produce costly private information about the payoff x of the project that backs the

security?

We show that quasi-debt is an optimal security for an uninformed buyer to purchase. Further,

we show that there is never endogenous adverse selection in equilibrium even if the

information cost is vanishingly small. To prevent adverse selection when the cost of

information acquisition is low, the buyer either reduces the amount of quasi-debt to buy or

bribes the seller not to acquire information by paying a price higher than the expected payoff

of the quasi-debt. Even if the information cost is zero the buyer purchases a debt contract such

4

that the seller is indifferent between acquiring and not acquiring information. In such a case

debt is the uniquely optimal security.

This result is different from the result in Dang, Gorton and Holmström (2012) who show that

if an uninformed seller faces a buyer who can acquire information then there is adverse

selection in equilibrium if the information cost is low. In such a setting there is positive

probability that there is no trade. Combining these two results we formalize the notion that it

is easier to buy than to sell a security.

In a second application, we apply the IS concept to securitization and show that the creation

of a securitized asset, i.e. debt backed by a pool of projects or loans, minimizes the IS.2

Another application of IS concerns its use in optimal portfolio choice under symmetric

information. We show that IS is not ranked-correlated with variance and skewness and is thus

a new characteristic of a security. We show that IS is a sufficient statistic for expected utility

maximization if the agent has a linear reference point utility.3 Finally, we show that IS is a

pricing factor in a representative agent economy where the representative agent has a linear

reference point utility function. There is a trade-off between IS and expected return.

In the finance literature the notion of information sensitivity has different meanings in

different contexts. In Gorton and Pennacchi (1990) information insensitivity means literally

riskless. They show that banks produce such securities for use by uninformed agents to avoid

adverse selection. In DeMarzo and Duffie (1999) information sensitivity of a security

measures the “slope” of the inverse demand function in a signaling equilibrium of a game

where an informed seller faces a set of competitive uninformed buyers. In the market

microstructure literature starting with Kyle (1985, 1989) the notion of information sensitivity

typically refers to the price impact of the “volume of informed trades”.

There is large literature on optimal security design in finance. A class of papers discusses

security design in a corporate finance context where a privately informed issuer (seller) faces

2 Gorton and Pennacchi (1993) show that the creation of a composite security increases the utility of uninformed

agents when they face privately informed buyers in secondary markets. In DeMarzo (2005), pooling reduces the

adverse selection problem an uninformed agent faces when he sells to an informed intermediary while tranching

increases the amount that the informed intermediary (seller) can sell to uninformed buyers subsequently. Both

papers assume exogenous adverse selection. In our paper securitization maximizes trade and the utility of

uninformed agents without triggering endogenous adverse selection. 3 This result is similar in spirit to the result that mean and variance are sufficient statistics for expected utility

maximization and optimal portfolio choice if the agent has a quadratic utility function.

5

a set of uninformed investors (buyer). See e.g. DeMarzo and Duffie (1999) who also give a

brief survey of that literature. DeMarzo, Kremer and Skrzypacz (2005) analyze optimal

security design as a mean of payment in a private value auction context and show that debt is

the “worst” security for a seller to accept. Che and Kim (2010) add exogenous adverse

selection to their setting and show that debt is the optimal security.4

Rather than analyzing security design under exogenous private information, we analyze how

security design affects the demand for information production and thus endogenous adverse

selection. In our setting, the optimal contract never induces adverse selection even if the

information cost is vanishingly small.

Costly state verification models (e.g. Townsend (1979), Gale and Hellwig (1989)) show that

debt is the optimal security because it minimizes ex post monitoring costs. There is no ex post

verifiability problem in our model but we focus on potential information acquisition ex ante.

In particular, the minimization problem of πR=ʃmax[s(x)-p,0]f(x)dx, i.e. the incentive to learn

about high states x ex ante, represents a very different economic issue. Regarding, the welfare

implications, in costly state verification models the most efficient outcome is achieved if

monitoring cost is zero while there is first best in our model if information cost is high.5

The mechanism design literature in economics is also large. Most papers assume exogenous

private information, i.e. the types of agents are private information of the respective agents.6

Our design problem is similar in flavor to Cremer and Khalil (1992) who analyze a principal-

agent setting where the agent can acquire socially useless information before making a

production decision. They show that in equilibrium the principal does not induce the agent to

acquire information. In their paper the uninformed principal is uncertain about the total rents

from optimal production. The focus of our paper is on a pure exchange setting and the

uninformed agent is concerned about an endogenous lemons problem.7 Further, they analyze a

4 Innes (1990) analyzes security design, investment decision and moral hazard. Aghion and Bolton (1992)

analyze security design and allocation of control rights. Our paper shows how to split an exogenous cash flow

when there is endogenous adverse selection concern. 5 Interestingly, asset backed securities (ABS) seem to be designed to maximize the verifiability of cash flow by

having a servicer and trustee in any securitization process. Also, special purpose vehicles are bankruptcy remote. 6 Bergemann and Valimaki (2002) discuss information acquisition and mechanism design.

7 The result that there is no induced information acquisition in equilibrium is not driven by the assumption that

information has no social value. Dang, Gorton and Holmström (2012) show that if an uninformed seller proposes

a contract and faces a security buyer who can acquire information, then the optimal contract may induce the

buyer to acquire socially useless information in equilibrium.

6

model with a discrete type space while in our model the type space is continuous and we put

no restriction on the distribution F(x) of types and discuss implementation.

The next section defines information sensitivity (IS) and relates it to the value of information

in a trading context. Section 3 derives a set of securities with minimal IS. In Section 4 we

apply this concept to solve an optimal security design problem with endogenous information

acquisition. Section 5 analyzes securitization as a means to reduce IS. In Section 6 we provide

a generalized IS measure and its characterization for a broad class of utility functions and

standard signal structures. Section 7 applies IS to optimal portfolio choices and asset pricing.

Section 8 concludes.

2. Information Sensitivity and the Value of Information

We first define Information Sensitivity (IS) of a security and characterize some useful

properties. Consider a security s that is backed by an asset x and pays off s(x) at t=1 and has

price p at t=0. x is a random variable with positive support on [xL, xH] and distribution F(x).

Formally, s(x) is a function that maps each realization of x to a repayment s(x). The only

restriction we impose on the function s is that s(x) satisfies the resource feasibility (or limited

liability) constraint, i.e. s(x)x for all x. Note, s(x) can be non-monotonic.8

Definition (Information Sensitivity (IS))

Consider an arbitrary contract (p, s(x)). The information sensitivity (IS) of a security, s(x) at

price p in the loss (“left”) region (L) and profit (“right”) regions (R) are defined as follows:

H

L

x

x

L dxxfxspxsp )(]0),(max[))(,(

H

L

x

x

R dxxfpxsxsp )(]0,)(max[))(,(

See Figure 1 for an illustration. Consider a buyer of the security. If s(x)<p, he suffers a loss ex

post. The expected loss in low payoff states is given by πL and the expected profit in high

payoff states is given by πR. The following Lemma will prove useful for subsequent results.

8 Some examples are: (i) Equity: s(x)=x where (0,1] is the share on the x; (ii) Debt: s(x)=min[x, D] where D

is the face value of the debt.

7

Lemma 1

(i) If p=E[s(x)] thenRL

.

(ii) 0/ dpd L and 0/ dpd R .

Proof

Part (i). E[s(x)]=p can equivalently be written as 0])([ pxsE

0)())(()())((

})(|{})(|{

pxsxpxsx

dxxfpxsdxxfpxs

})(|{})(|{

)())(()())((pxsxpxsx

dxxfxspdxxfpxs .

Part (ii). This follows from simple inspection of the formulae.

A. The Value of Information in Trading

Suppose an agent with utility function U=c0+c1 can buy or sell a security s(x) at price p at

t=0. The security pays off s(x) at t=1. At t=0, the agent can obtain private information before

buying or selling the security. If the agent becomes informed, he learns the true realization of

x.9

Consider an arbitrary contract (p,s(x)), i.e. an agent can trade a security s(x) at price p. The

value of information for a buyer (B) of s(x) is defined as EUB(I)EUB(NI), where EUB(I) is

the expected utility based on the optimal transaction decision in each state under perfect

information about x (I), and EUB(NI) denotes the expected utility of an optimal transaction

decision based on the initial information, i.e. no information about the true state (NI).

Analogously, the value of information for a seller (S) of s(x) is EUS(I)EUS(NI).

Proposition 1 (The Value of Information)

Consider an arbitrary contract (p,s(x)). The value of information (V) to a potential buyer (B)

and a seller (S) is the same and is },min{ RLV .

Proof

Seller: Consider an agent who owns s(x). (i) If )]([ xsEp , an uninformed agent does not sell

and EUS(NI, no trade)=E[s(x)]. If the agent is informed, he sells (does not sell) in state x

9 Section 6 derives a generalized IS measure for arbitrary utility functions and a class of information structures.

8

where )(xsp ( )(xsp ) so that dxxfxsdxxfpIEUQQ

S)()()()(

where

})(|{ pxsxQ

and })(|{ pxsxQ

. Therefore, ) ,()( tradenoNIEUIEUV SSS

L

. If )]([ xsEp , an uninformed agent sells and )]([) ,( xsEptradeNIEUS

. So

RSSS tradeNIEUIEUV ),()( . Lemma 1 shows that at p=E[s(x)],

RL and for

)]([ xsEp , RL and for )]([ xsEp , RL . Therefore, },min{ RLSV .

Buyer: The proof is analogous and first given in Dang, Gorton and Holmström (2012). QED

The intuition is simple. For p<E[s(x)], an uninformed agent is not willing to sell. If he is

informed, he sells in states x where s(x)<p. The value of information is that he avoids the

“mistake” of not selling the security in low payoff states. Integrating over all x where p-

s(x)>0 yields L

. For pE[s(x)], an uninformed agent sells s(x). Information changes his

trading decision and he does not sell in states x where s(x)>p. The value of information is that

he avoids selling the security for too little in high payoff states. Integrating over all x where

s(x)-p>0 yieldsR

. For p<E[s(x)],

L < H while for p>E[s(x)],

L > H . So the value of

information is },min{ RLV .

Lemma 1 does not assume that s(x) is monotonic in x. s(x) can intersects with p arbitrarily

often. Whenever s(x)<p, then p-s(xp “contributes” toL

.

Corollary 1.1

Define )(minmin

xss and )(maxmax

xss . For all s(x) and any F(x) the following hold:

(i) 0V if min

sp or max

sp .

(ii) V

has its maximum at p=E[s(x)].

Proof

Part (i) follows directly from inspection of the formulae in Lemma 1.

Part (ii). For )]([ xsEp , 0/ dpd L ; and for )]([ xsEp ,

0/ dpd R .QED

The intuition for Corollary 1.1 (i) as follows. At min

sp , an (uninformed) buyer always buys.

A seller can never gain by selling the security. Therefore information has no value to them.

9

Analogously, atmax

sp , an (uninformed) seller always sells and a buyer can never gain by

buying the security.

3. The Class of Securities with Minimal Information Sensitivity

Proposition 1 shows that the value of information is },min{ RLV what we call the

information sensitivity (IS) of a security. In this section we ask which security minimizes the

value of information or IS. We impose no restriction on the set of securities except resource

constraint (limited liability), i.e. the security cannot repay more than the underlying x. We will

compare all securities in this set with the same expected payoff E[s(x)]=W.

Set of securities

The set of securities is } )(:)({( xxsxsS .

Definition (Quasi Debt)

Define } if and if )(:)({ pxps(x)pxxxsxsS QD . A security QDSxs )( is called a

quasi debt contract.

Definition (Standard Debt)

sD(x)=min[x,D] is standard debt with face value D.

Standard debt (or just debt) is a special case of a quasi debt contract. Figure 2 illustrates three

quasi debt securities with the same expected payoff W and where the “blue” security is

standard debt.

Figure 2

10

Now we derive securities with the minimal IS. We provide a very simple characterization of

the full set of solutions to the following two minimization problems in the functional space

S={s(x): xxs )( and E[s(x)]=W}:

H

L

x

x

Ldxxfxsp )(]0),(max[ min

s(x)

and

H

L

x

x

Rdxxfpxs )(]0,)(max[ min

s(x) .

Lemma 2

For any f(x) and price Wp , the only securities that minimize )(L

are quasi debts contracts,

sQD

(x).

Proof

S

x

x

x

x

QD ISdxxfxspdxxfxpISH

L

H

L

)(]0),(max[)(]0,max[ since s(x)<x for some

x<p. QED

This result is intuitive. In Figure 3, AIS QD while BAIS S . For Vp , the IS of quasi-

debt is EDQD

R

while the IS of non-quasi debt is FES

R . The next Lemma shows

that the probability weighted area D is strictly smaller than the probability weighted area F in

Figure 3. Thus any non-quasi-debt has a higher πR than quasi debt. Surprisingly, at least to us,

the solution to the minimization of R

is also independent of f(x).

Figure 3

11

Lemma 3

Define D as the solution to H

L

x

xWdxxfDx )(],min[ .

(i) For any f(x) and price ),[ DWp , the only securities that minimize )(R

are quasi debt

contracts.

(ii) At p=D, (standard) debt is the unique minimizer of )(R

.

(iii) If p>D, any security with ps max

has IS=0.

Proof

Case (i): For ),[ DWp , IS=R

where EDQD

R and FES

R . We compare all s(x)

with E[s(x)]=W. For quasi-debt, the probability weighted integral (areas) is B+C+D+E=W

while for s(x), it is C+E+F=W. This implies F=D+B. Since B>0, S

R

QD

R . Any s(x) with

minimal R

must have s(x)=x for px and pxs )( for px .

Case (ii): The maximum payoff of standard debt is D and smaller than the maximum payoff

of any s(x) with the same expected payoff. Therefore, if p=D, then )(0)( DD S

R

D

R .

Case (iii): Follows from Corollary 1.1 (i). QED

Intuitively speaking, a non-quasi debt security does not minimize πR because one can move

information value to the area below the price p and above s(x). In Figure 3 one can move

information value from the area F to area B until B vanishes. Lemmas 2 and 3 imply the

following result.

Proposition 2

Quasi-debt minimizes the value of information and is least information sensitive for all prices

p and any f(x).

Proposition 2 shows that the set of solutions to both minimization problems )(L

and )(R

are quasi debt contracts and distribution free. In other words, seniority of payoffs is key. As

the price increases the set of quasi debts “shrinks”. At p=D, debt is the unique solution, i.e.

the only security with minimal IS.

12

4. Information Sensitivity and Optimal Security Design

Now we apply the IS measure to solve a new optimal security design problem: What is the

optimal security for an uninformed buyer to transact with if he faces a seller who can acquire

costly information about the payoff of the underlying asset? The literature on optimal security

design and implementation theory in economics is large but to our knowledge, there is no

answer to this question. Dang, Gorton and Holmström (2012) discuss optimal security design

for a seller who faces a buyer who can acquire information. The equilibrium outcome in terms

of information acquisition in these two settings will be very different.

A. The Setting

We consider two risk neutral agents {A,B} with utility functions

UA=cA0 + cA1

UB=cB0 + cB1

where >1 is a constant. Agent A owns a project X that pays off x units of goods at t=1.

Agent B owns w units of perishable goods at t=0. w is a constant and X is a random variable

with positive support on [xL,xH] and distribution F(x). We assume that the realization of x is

verifiable at t=1. At t=0, agent A can acquire private information about the final payoff of X

at the cost (in terms of utility). If agent A becomes informed, he learns the true realization x

of X.

Given the preferences and endowments, there are gains from trade. It is socially efficient for

agent B to consume at t=1 by exchanging his w units of t=0 goods for some of agent’s A

goods at t=1. In order to trade, agents need to write a contract which specifies what agent A

should deliver at t=1.

Again, let })(:)({( xxsxsS denote the set of all possible securities. In principle, agent A

could promise whatever he wants, e.g. s(x)>xH, but agent B would simply not believe it. The

optimal design problem is to design a contract (p,s(x)) that maximizes agent B’s expected

utility subject to agent A obtaining at least his reservation utility E[x] and subject to

information acquisition constraint. This is equivalent to the following game.

1. Agent B makes a take-it-or-leave-it offer of (p,s(x)) to agent A.

2. Agent A chooses whether to produce private information.

13

3. Agent A accepts (p,s(x)) or not.

If agent A accepts (p,s(x)), agent A consumes p units of good and agent B consumes the

remaining w-p units of goods at t=0. At t=1, agent A consumes x-s(x) and agent B consumes

s(x). If there is no trade, agents consume their endowments.

A. Intermediate Results

Consider (p,s(x)) with s(x)=x and p=E[x]. If agent B buys the whole project X, then the IS of

agent A is ISX=ʃmax[E[x]-x,0]f(x)dx. Corollary 1.1 (iii) shows that IS

X is the maximal IS.

Define

H

L

x

x

dxxfxxE )(]0,][max[ .

Lemma 4

Suppose , any security s(x) with E[s(x)]=min[E[x],w] and p=E[s(x)] maximizes agent

B’s expected utility.

Proof

If agent B proposes to buy the whole project X for the price p=E[x], then a best response of

agent A is to sell without acquiring information. If )]([ xsEw , buying the whole X for a

price p=E[s(x)] clearly maximizes agent B’ utility subject to agent A obtaining his

reservation utility E[x]. If )]([ xsEw , then agent B buys what he can afford, namely a

security s(x) with p=E[s(x)]=w. Any of these securities has IS . QED

So debt is an optimal security for agent B to buy. Note, s(x)=x can be interpreted as a

(degenerated) debt contract with s(x)=min[x,D] where D=xH.

Lemma 5

Suppose

and p=E[s(x)]. The maximal amount E[s(x)] that agent B can buy without

triggering information acquisition and without giving agent A any rents is a quasi debt

contract with p=E[sQD

(x)]=min[w,v] where v solves

H

L

x

x

QD dxxfxsv )(]0),(max[ .

14

Proof

Agent A gets no rents, if p=E[s(x)]. For p=E[s(x)], πL= πR. We focus on πL. Since , v as

a solution to the above equation implies v<E[x]. Buying quasi debt with p=E[sD(x)]=v does

not trigger information. Lemma 1 implies that any non quasi debt security with E[s(x)]=v and

price p=v has )()( vv QD

L

S

L . Note, if agent B owns w<v, then the maximum he can pay

is w which does not trigger information either. QED

Figure 4 illustrates the maximal amount agent B can buy without triggering information

acquisition and where the contract does not give any rents to agent A. In other words, agent B

reduces the amount of debt to purchase to avoid information acquisition. Note, if (quasi-)debt

triggers information at p, then so do all other securities with the same expected payoff.

Figure 4

Lemma 6

Consider an arbitrary price p. A quasi debt contract with pxsE QD )]([

that just does not

trigger information production by agent A maximizes agent B’s expected utility at that price.

Proof

We divide the proof in four steps.

Step 1: Consider an arbitrary contract (p, s(x)) that triggers information acquisition.

Conditional on trade, the expected value of s(x) is given by

})(:{

)()(])([pxsx

dxxfxstradexsE .

See Figure 5.

15

Figure 5

Step 2: We now construct another security that sells for the same price, and does not induce

information acquisition, but strictly dominates the arbitrary contract considered above.

Consider the contract (p, )(~ xs ) with )(~ xs =p for x>xS and )(~ xs =s(x) for x<x

S. See Figure 6,

below. Under this contract, agent A sells without information acquisition since p )(~ xs for

all x. The expected value of )(~ xs is ]|)([)()(~)](~[ tradexsEdxxfxsxsEH

L

x

x

.

Figure 6

Step 3: We show that agent B can do even better by buying debt with D=p. (Note, )(~ xs is not

debt since s(x)<x for some x<p.) Trade always occurs and the expected payoff of debt is

larger than )](~[ xsE . See Figure 7. Formally,

H

L

x

x

D dxxfpxtradexsE )(],min[]|)([

}:{

)()(~])(~[Sxxx

dxxfxstradexsE

since )(~)( xsxs D and for some x the inequality is strict.

16

Figure 7

Step 4: We show that for any given price p, the optimal security is (quasi-) debt such that

agent A is just indifferent between information acquisition and no information acquisition.

See Figure 8.

Figure 8

At an arbitrary price p, a (quasi-) debt contract with either pxsE QD )]([ and R

or

pxsE QD )]([ and R

maximizes the expected payoff of the buyer. QED

B. The Optimal Security

Now we are in a position to derive the optimal contract (p,s(x)) that maximizes the expected

utility of agent B, an uninformed buyer. We first define two strategies.

Strategy I: (Reduced trade)

Buy quasi-debt sI(x) with expected payoff E[s

I(x)]=pI where the price pI solves

17

H

L

x

x

I

Idxxfxsp )(]0),(max[ .

Note, in the case of a standard debt, the associated face value DI is determined by

I

x

x

IpdxxfDx

H

L

)(],min[

The expected utility of Strategy I is

III

I

BppwpxsEwIEU )]([)( .

Strategy II: (Bribe)

Buy quasi-debt sII(x) and price pII > E[s

II(x)] which maximize

II

x

x

II

BpdxxfxswEU

H

L

)()(

s.t. H

L

x

x

II

II dxxfpxs )(0,)(max .10

Note, pII>E[sII(x)]>E[s

I(x)]=p

I.

Proposition 3

Agent B proposes the following contract (p,s(x)) :

(i) If , any s(x) with p=E[s(x)]=min[w,E[x]] is optimal.

(ii) If 0 , depending on {α, γ, F, w} agent B buys (quasi-)debt according to either

Strategy I or Strategy II.

Agent A does not acquire information in any equilibrium.

Proof

Part (i) follows from Lemma 4.

Part (ii): Information acquisition is a binary decision. So agent B has two types of potential

best responses. Either he avoids information acquisition by agent A or he induces agent A to

acquire information. Lemma 5 shows that inducing agent A to acquire information is a strictly

dominated strategy. Lemma 4 shows that if agent B wants to avoid information acquisition

and pay p=E[s(x)], i.e. he does not give any trading surplus to agent A, then the maximal

amount he can trade is to buy a quasi-debt contract and the price pI is given in Lemma 5.

Denote this amount as E[sI(x)]. For γ small this amount is small. In order to trade more agent

10

Note, for p>E[s(x)], the IS is πR.

18

B can “bribe” agent A not to acquire information by paying a price pII>E[sII(x)]>E[s

I(x)]=p

I.

Strategy II characterizes the optimal contract (pII, sII(x)) with a bribe. Agent B chooses the

strategy with the higher expected utility. QED

Proposition 3 shows that the optimal strategy for agent B is to avoid adverse selection. This

can be achieved in two ways, either by (i) reducing the amount of trade or (ii) bribing. In the

first case by proposing a security with p=E[s(x)], agent B does not give agent A any rents. At

p=E[s(x)], RL

. Quasi-debt is optimal because it minimizes L

for any p=E[s(x)] so

agent B can maximizes E[s(x)] without triggering information production. If the optimal

strategy is to avoid adverse selection by bribing, then quasi-debt is optimal because it has the

lowest R for any p>E[s(x)], i.e. for any p, the bribe is cheapest. If α is large and γ small,

agent B chooses Strategy II.

Corollary 3.1

Suppose γ=0. Denote p0 as the maximizer of H

L

x

xpdxxfpx )(],max[ .

(i) The optimal contract is unique. Agent B buys debt with price p0 and D=p0.

(ii) For sufficiently large, agent B buys debt with D=p=w.

The seller is indifferent between acquiring and not acquiring information.

Proof

For γ=0, the constraint in Strategy II yields the optimal face value D=p.

(i) Agent B maximizes

EU=

p

x

x

x L

H

L

pppFdxxxfpdxxfpx ))(1()()(],max[ .)()1()(

p

xL

ppFpdxxxf

There is always a positive amount of trade since the maximum value of EUB is always positive

because for p sufficiently small, )(1 pF . The associated face value D

solves H

L

x

x

pdxxfDx0

)(],max[ .

(ii) EUB .)()1()(

p

xL

ppFpdxxxf Note, the first term is strictly increasing in p and the

second and third term is ))(1()()1( pFpppFp

)1)(1(( pFp . This is positive

if )(1

1pF

. Thus he pays w. QED

19

This corollary shows that even if information costs is zero, the buyer purchases a debt

contract such that the seller is indifferent between acquiring and not acquiring information.

Furthermore, standard debt is the uniquely optimal security. If the private information of the

seller is exogenous and perfect, Corollary 3.1 contains a result in Bias and Mariotti (2005) as

a special case of γ=0 where the indifferent seller chooses to acquire costless information.

C. A Formalization of “It is easier to buy than to sell securities”

Proposition 3, which states that there is never information acquisition in equilibrium, is very

different from the result in Dang, Gorton and Holmström (2012) who show that if the seller

makes an offer and the buyer can acquire information then there is information acquisition in

equilibrium when the information cost is small and the gains from trade are large. The

economic intuition is interesting. If the seller is the proposer the only way to prevent

information acquisition by the buyer is to ask for a price p such that )( pL . Independent

of the expected payoff E[s(x)] of the security or how much (more) the buyer can get in the

high states, the buyer’s best response is to acquire information if the loss he can avoid in low

payoff states is smaller than the cost of information. The seller has no way to bribe the buyer

other than asking for a low price. In some sense the limited liability of the seller is binding. If

the gains from trade are large, then asking for a low price is dominated by triggering

information acquisition and the probability to trade at a higher price. However, there is a

positive probability that there is no trade.

In contrast, if the buyer makes the offer and the seller can acquire information, the buyer can

prevent information acquisition at any price )]([ xsEp , when he does not ask to get repaid

too much. Note, the seller acquires information if )( pH . By reducing the payoff of the

security s(x) in high states he can make )( pH . In the extreme case where s(x)=min[x,p],

one best response of the seller is not to acquire information even if 0 . In other words, the

buyer can bribe the seller not to acquire information at any price p by reducing E[s(x)].

Besides being able to prevent information acquisition by the seller, Proposition 3 shows that

avoiding information acquisition is a strictly dominant strategy for the buyer.

If we fix the expected payoff of an asset E[x] and compare the seller’s ability to sell a security

s(x) and the buyer’ ability to buy s(x), then we can show that it is easier to buy than to sell a

security in the following formal sense. If the seller wants to sell for sure he can only ask for a

20

price p such that )( pL. If

is small than p is small. The price the seller obtains

converges to zero as

goes to zero. In contrast, if the buyer wants to buy, there is never

information acquisition in equilibrium and trade always occurs with probability one. Even if

0 , the buyer can purchase an security s(x)=min[x,p] with probability one and has an

expected payoff )]([ xsE which is strictly bounded away from zero.

5. Information Sensitivity and Securitization

In this section we turn to a second application; we apply the IS measure to understand

securitization. We show that the creation of a securitized asset, i.e. debt backed by a pool of

projects, minimizes IS.

Consider a set {X1,..,XN} of N projects with the joint distribution F(x1,,..,xN) and marginal

distributions Fi(xi). Suppose the seller owns N projects. He can sell (i) N arbitrary securities,

(ii) N debt separate debt securities, (iii) or a securitized debt. Similarly to Section 4, we ask

which of the three financial arrangements minimizes the seller’s incentive to acquire

information or equivalently which minimizes the expected loss of the buyer in low payoff

states even when there is no endogenous lemons problem. In other words, what security does

an uninformed agent want to buy?

Case 1: Suppose security si(xi) is backed by project xi and all securities have the same

expected payoff and the same price p=E[si(xi)]. If agents pick and trade individual securities,

then the total IST0

is given by:

N

i

x

x

iiiii

iH

iL

dxxfxsp1

N

1i

i

T0 )(]0),(max[IS .

Case 2: Seller can pick and sell N separate debt securities, i.e. si(xi) are debts. IST1

is given by:

N

i

x

x

iiiii

N

i

D

i

iH

iL

dxxfDxp11

T1 )(]0 ],,min[max[IS

N

i

ii DxpE1

T1 ]0 ],,min[max[IS

It is obvious that IST1

<IST0

since debt minimizes i D

i for all i. The inequality is strict if

security i is not (quasi-)debt.

21

Case 3: Seller can sell a securitized debt with E[s(x)]=Np, that is backed by the pool of N

projects, for the price Np. The expected loss of this securitized debt portfolio or the total IST is

given by:

),..,(),..,(0 ],,min[maxIS 11

1

T2

NN

N

i

i xxdxxfDxNp .

Proposition 4 (Optimality of Securitization)

Securitized debt reduces IS further.

Proof

We will show that 12 TT ISIS .

Step 1: Consider a portfolio of N debts each backed by one project. Agents cannot pick

individual securities. Either the portfolio is sold or there is no trade. The IS of this portfolio is

),..,(),..,(0 ,],min[max 11

1

NN

N

i

ii xxdxxfDxNpIS

0 ,],min[max1

N

i

ii DxNpEIS

Step 2: The following arguments show that IST1

> SI .

Define

N

i

iiN Dxpxx1

1

T1 ]0 ],,min[max[),...,(

0 ,],min[max),..,(1

1

N

i

iiN DxNpxx

01 T if and only if all pxi . If all pxi , then 0__

. In contrast, 0__

if pxN

i

iN

0

1. It

is obvious that there are more states (xi,..,xN), such that 0__

than the case where 01 T . Also for

each (xi,..,xN), __

1 T. Therefore,

1TISSI since there is a continuous set of states where 0__

but 01 T .

22

Step 3: The following arguments show that 2TISSI . For a realization of (x1,..,xN),

00 ],,min[max1

DxNpN

i

i if Npxi while 00 ,],min[max

1

N

i

iiDxNp if

Np],xmin[i

i

D . It is easy to see that ii

xD ],xmin[i

. So 1

__2 TT ISISIS . QED

This proposition shows that securitization, i.e. the pooling of cash flows and then selling a

senior debt backed by that pool of cash flows, minimizes the IS or endogenous adverse

selection concerns. Note, if diversification is a prime concern, then agents trade equity shares

backed by the pool of projects instead of senior debt.

6. Information Sensitivity, Risk Aversion and Imperfect Information

In this section we discuss some extensions. Subsection A provides a generalized IS formula

for arbitrary utility functions and shows that quasi debt minimizes IS. Section B analyzes

different information structures and gives conditions for (quasi-) debt to be least IS when

agents are risk avers and the information acquired is not perfect. Section C discusses some

further assumptions.

A. General Utility Functions

Suppose an agent with utility function U(c0,c1) has an endowment of w0 units of goods at date

0 and w1 units of goods at date 1.11

Define p’ as the agent’s maximum-willingness-to-pay for

the asset, i.e. ),())(,'(1010

wwUxswpwEU . If 'pp , an uninformed agent buys s(x).

Otherwise he does not buy s(x). If the agent obtains perfect information, he buys s(x) in state x

if UwwUxswpwUxsU ),())(,())((1010

. For a given p, Q>={x: UxsU ))(( }

denotes the set of states where an informed agent buys s(x). At states Q<={x: UxsU ))(( }

an informed agent does not buy the security. From EU(I)-EU(NI), the value of information is

given as follows:

dxxfxswpwUwwU

dxxfxswpwUwwU

H

L

x

z

Q

L

)(]0)),(,(),(max[

)())(,(),(

1010

1010

if 'pp

11

If w1 is stochastic, we need the joint distribution of x and w1. The reservation utility of the agent is EU(w0,w1).

To save on notation we assume w1 is a constant.

23

and

dxxfwwUxswpwU

dxxfwwUxswpwU

H

L

x

z

Q

R

)(]0),,())(,(max[

)(),())(,(

1010

1010

if 'pp .

Proposition 5

Suppose the signal is perfect and the agent has U(c0,c1). Any security that minimizes IS has

s(x)=x for all x where ))(,( xsU <U(w0,w1).

Proof

For any strictly increasing utility function and p<p’, quasi-debt minimizes L

since x>s(x)

for all x<p’ implies ))(,(),( xsUxU . For p>p’, the slope of ),( xU is weakly larger than

the slope of ))(,( xsU . Any s(x) with slope of ))(,( xsU strictly smaller than the slope of

),( xU has higher R

because one can reduce information value by moving information value

below the “price line” U(w0,w1). See Figure 9. QED

Figure 9

B. Imperfect Information

Suppose the agent has an endowment of w0 units of goods at t=0 and w1 units of goods at t=1,

and utility function U(c0,c1). Further, suppose the agent obtains a signal z that induces F(x|z)

and where z has density g(z). Given a signal structure {F(x|z)}, the value of information is

given as follows:

dzzxfzxswpwUEwwUZ

L)|(0],|))(,([),(max

1010 if 'pp

24

and

dzzxfwwUzxswpwUEZ

R)|(0),,(]|))(,([max

1010

if 'pp ,

where

dxzxfxswpwUzxswpwUEH

L

x

x

)|())(,(]|))(,([1010 .

We consider three types of (common) signal structures.

Proposition 6

Suppose the agent has U(c0,c1) and obtains a noisy signal xz

where is an independent

random variable with 0][ E , 2)(

Var and and x are stochastically independent.

Any security that minimizes IS has s(x)=x for all x where ),),((10

wwxsEU <U(w0,w1).

Proof

Denote p’ as the agent’s maximum willingness to pay when he is uninformed. Suppose p=p’.

Upon observing z, the expected payoff of the security is ]|,),([10

zwwxsEU . The buyer does not buy

the security s(x), if he observes pzwwxsEU ]|,),([10

. Since 0][ zE , the same arguments as

given in the proof of Proposition 2 show that debt gives rise to the smallest set of states z where

information has value to the buyer and for any of these states

]|,),([]|,),([1010

zwwxsEUpzwwxsEUp D . This argument holds analogously for any p.

QED

Proposition 7

Suppose the agent has U(c0,c1) and obtains a signal z that induces F(x|z) where the support of

each F(x|z) is a partition of the state space X. Any security that minimizes IS has s(x)=x for all x

where ),),((10

wwxsEU <U(w0,w1).

Proof

Denote p’ as the agent’s maximum willingness to pay when he is uninformed. Suppose p=p’.

For a security s(x), define {F<} as the set of posterior distributions where z induces )f(x|zf

Z such

that ']|,),([10

pzwwxsEU . Analogously, define {F>} to be the set of posterior distributions where

z induces )f(x|zfZ such that ']|,),([

10pzwwxsEU . Given a debt contract, agent B does not

buy it for the price p if he observes fz{F}<. The value of information is

}{

10]|,),([

DFZ

Z

DD

LzwwxsEUp where Z

is the probability for observing this subset of

25

the partition. The value of information of another security s(x) is

}{

10]|,),([

SFZ

Z

S

LzwwxsEUp . Since )()( xsxxs D for all x<p, }{}{ SD FF

and ]|,),([]|,),([1010

zwwxsEUzwwxsEU D for all } D

Z{Ff . Thus

S

L

D

L for all s.

Similarly, any s(x) that minimizes R must have slope 1 otherwise, information value can be

reduced. QED

Proposition 8

Suppose the risk neutral agent receives a signal z which induces F(x|z) where x and z are

affiliated. And suppose s(x) is non-decreasing. Debt has minimal IS.

Proof

Suppose E[s(x)]=E[sD(x)]=V and the signal z is continuous and has density g(z) and the prior

z0 is an element in the set of posteriors. So E[s(x)|z0]=E[sD(x)|z0]=V. Lemma 1 in DeMarzo,

Kremer and Skrzypacz(2005) shows that E[s(x)|z] intersects E[sD(x)|z] once from below in

the z space. See Figure 10 where the blue curve is debt and the green curve an arbitrary

security. It is obvious, that for Z

z

DD

LdxxfzxsEp )(]0],|)([max[

S

L

Z

zdxxfzxsEp )(]0],|)([max[ and for p>V, S

R

D

R . QED

Figure 10

These propositions show that given an underlying collateral x, the most senior security s(x)

has the minimal IS and this observation holds under standard assumptions about information

structures and utility functions.

26

C. Stochastic Contrasts and Security Insurance

This subsection discusses stochastic contracts and relaxing the assumption of limited

liabilities. Consider the following general class of stochastic contracts. The payoff s(x) is a

random variable that maps each realization x to an element s(x) in the interval [xL, x]

according to the distribution Hx where the set {Hx}.

Quasi-debt has a strictly smaller IS than any stochastic contract. Note, even if s(x) is

stochastic, the stochastic repayment s(x) must be backed by the outcome of the underlying X.

Suppose p=E[s(x)]. If a potential buyer knows that x<p, he knows s(x)<p for any stochastic

realization s(x). So information about X has value to a potential buyer even if s(x) is stochastic

and determined at t=1. More importantly, stochastic repayments increase the value of

information since with positive probability the agent obtains s(x)<x for all x<p. Thus the IS of

a stochastic contract is strictly higher than quasi-debt.

The limited liability assumption is not crucial. Suppose there is security insurance. For any x

where s(x)<p, the seller can repay m(x) where m(x)>x. Then debt with s(x)=[m(x), D] has

minimal IS. The key point is seniority of repayment.12

7. Portfolio Choice, Asset Pricing and Information Sensitivity

In this section we discuss the final applications of IS. We do not assume information

acquisition and adverse selection but focus on another important interpretation of IS in a

setting of symmetric information. As mentioned, for a security buyer, πL measures the

expected monetary loss of the security in low payoff states and πR measures the expected

monetary gains in high payoff states. See Figure 1. In Section A we show that the IS and

variance of a security are not rank-correlated. In Section B we derive a class of utility

functions where IS is a sufficient statistic for the optimal portfolio choice and expected utility

maximization. Section C shows that there is a tradeoff between IS and expected return.

Section D shows that IS is a pricing factor.

12

An alternative interpretation is the following. If there is unlimited liability this is equivalent to a shift of f(x) to

the “right”, i.e. there is less or no probability mass on the left tail. The IS of equity is always strictly positive.

27

A. Information Sensitivity and Variance

In this section we consider an economy with ,..,

1 states and N tradable assets in the

standard state space framework. Without loss of generality, we normalize all assets to have

the same expected payoff. (Otherwise we can scale down the asset payoff by a factor.) Also,

suppose the price p of the portfolio equals expected payoff. In order to find a portfolio

),..,(1 N

with the minimal IS, we solve:

1 1),..,(

)(0,maxISmin1

i

i

N

n

ninprobpx

N

with

N

i

i

1

1

and where

N

n

ninx

1

is the payoff of the portfolio in state i

. We allow for short selling. The

portfolio with the minimal variance solves

1

2

1),..,(

)(Varmin1

i

i

N

n

ninprobpx

N

where p is the expected payoff (mean). The solutions to both optimization problems are

identical if there exists a portfolio with Var=0. Then IS=0. We provide two numerical

examples to highlight that the IS and the variance of two securities are not rank-correlated and

the portfolio with minimal IS and the one with minimal variance can be very different.

Example1

Suppose there are two assts and three states where the states arise with probabilities 0.25, 0.5

and 0.25, respectively. The payoffs of assets A and B in the three states are given as follows:

1 2

3

E[X] Var(X) Skew(X) IS(X)

Asset A 1.70 2.50 3.30 2.50 0.320 0 0.20

Asset B 2.10 2.25 3.40 2.50 0.274 0.158 0.225

Among all portfolios with expected payoff 2.5, (i.e. 1i ) the portfolio

)815.0 ,185.0(),( BA

with payoff (2.026, 2.296, 3.382) has the minimal variance of 0.271,

28

a portfolio IS of 0.220 and skewness of 0.141. In contrast, the portfolio with the minimal IS

only consists of asset A.

The intuition is the following. In states 2, asset A pays off 2.50 and asset B pays off 2.25. By

combining assets A and B the portfolio payoff is different from p=E[X]=2.50. Since state 2

has a high probability this increases the portfolio IS. Note, in state 2, asset A has a payoff of

2.50 and does not contribute to IS.

For 1i with 0

i ,

iiPFIASIAS . In general, the portfolio IS is not the weighted

sum of the IS of individual assets. For example, the portfolio )10- ,11(),( BA

has an IS of

1.25 but the weighted sum of individual IS is negative. Zero is the lower bound of the IS.

Example 2

Suppose there are four states with equal probability and three assets with payoffs given as

follows:

1 2

3

4 E[X] Var(X) Skew(X) IS(X)

Asset A 2.0 2.0 3.0 3.0 2.50 0.250 0 0.25

Asset B 2.1 2.2 2.2 3.5 2.50 0.335 0.221 0.25

Asset C 1.7 2.5 2.5 3.3 2.50 0.320 0 0.20

Suppose there is no asset C. The portfolio with the minimal variance is )32.0 ,68.0(),( BA

and has an IS=0.226 and Var=0.226. The portfolio with the minimal IS is

)625.0 ,375.0(),( BA

and has an IS=0.203 and Var=0.248. If we add asset C to this

economy, then the portfolio with the minimal IS invests 100% in asset C and has an IS=0.2

and Var=0.32.

The two examples highlight that IS and variance are not rank-correlated even if two random

variables have zero skewness. In example 2, the portfolio variance increases as the IS of the

portfolio decreases. In that example, an agent who minimizes the expected loss in low payoff

states or has a reference point utility as defined below, buys asset C. An agent who has a

maxmin utility function chooses asset B. An agent who has a mean-variance utility function

chooses to hold the portfolio with the minimal variance since all assets have the same

expected return.

29

B. Information Sensitivity and Expected Utility Maximization

In this section we provide a class of utility functions where IS is a sufficient statistic for the

optimal portfolio choice and expected utility maximization. Consider an economy with N

assets with joint distribution F. The state space can be discrete or continuous. In the latter

case, the IS of a portfolio ),..,(1 N

is given by:

)(0,maxIS1

dFxN

n

nn

where is the expected payoff of the portfolio and also its price.

Definition (Linear reference point utility function)

]0,max[],min[110

mcmccURL

is called a linear reference point utility function

where

0,, mRL

and m is the amount invested and the reference point.

We assume that the reference point is the amount the agent invests. See Figure 11. In the

return space the reference point is the zero (net) return. We give some interpretations of the

reference point utility function for three important cases.

Figure 11

(i) Suppose 1RL

. See Figure 11. The first m units of t=1 goods generates a marginal

value of 1L

. If the agent consumes more than m units of t=1 goods, then any additional

amount has a marginal utility of 1. We can interpret m as the dollar amount that the agent

plans to spend for consumption (drinks and food) at t=1 (say in a restaurant). If he obtains

30

more than m, then additional money gives rise to a marginal valuation of 1. In terms of

banking, we can interpret the agent has a bank that needs cash to pay off its liability m. Any

amount up to m reduces potential bankruptcy and potential expected bankruptcy renegotiation

costs. So the first m units of dollar have a higher marginal valuation. If the agent is an

entrepreneur (firm), then m can be interpreted as the optimal investment level. If he obtains

less than m dollars, he has to scale back the size of a profitable project. Therefore, the first m

dollars have the highest valuation. 1RL

captures a kind of loss aversion.

(ii) Suppose 1LR

. Now in order to derive a high marginal valuation the agent needs to

have more than m units of t=1 goods. In a consumption setting, suppose the agent can only

dine at an expensive restaurant if he has at least m dollars. Otherwise, the agent cannot afford

it. In a corporate finance setting, m denotes the minimum investment amount. A firm can only

invest in a profitable project if it has an investment amount of m. Otherwise it cannot invest in

the project.

(iii) If RL , the utility function is linear and all payoffs generate the same marginal

valuation at t=1. So 10

ccU which is the utility function introduced in the baseline

model in Section 2. As we will see, in that case IS does not matter for the optimal portfolio

choice.

The ratio R

L

has the following economic interpretation. If 1

R

L

, the utility function is

concave and the agent cares more about low payoff states or downside risks and the left tail of

the payoff distribution. 1R

L

implies a convex utility function and the agent cares more

about high payoff states or upside potentials and the right tail of the payoff distribution.

Proposition 9: Consider a set of N assets where all assets have the same price m. Suppose the

agent with linear utility and reference point m can choose (only) one asset. Then )(iL

and

)(iR

are sufficient statistics for expected utility maximization.

Proof: From Corollary 1.1 and Lemma 1, the expected consumption by choosing asset X at

t=1, is given by:

31

RRLL

RL

RL

m

mxExmmE

mxmxEEU

)(

]]0,[max[]]0,max[[

]0,max[],min[

QED

An asset with price equal expected payoff or an expected net return of zero has RL . If

the expected return is larger than zero, then LR .

Corollary 9.1: Consider a set of N assets where all assets have the same expected payoff m.

Suppose the agent with linear utility and reference point m can choose (only) one asset.

If 1R

L

( 1

R

L

), then the agent chooses the asset with the minimal (maximal) IS. If 1

R

L

,

the agent is indifferent between all assets.

Proof: )()()( LRLLRLLRRLL mmmEU where m is the

expected payoff and π the IS of asset X. For 1R

L

( 1R

L

) the asset with minimal (maximal)

IS maximizes expected utility. If 1R

L

, IS does not matter. QED.

In Example 1 above, the expected utility is )(2.05.2)(LRL

AEU

and

)(25.05.2)(LRL

BEU . If 1R

L

, then EU(A)>EU(B).

Proposition 10: Suppose the agent has a linear reference point utility function with

1, HL

and m units of t=0 goods. Suppose the agent can hold a portfolio consisting of N

assets where the price of each asset is p=E[s(x)]. Expected utility maximization is equivalent

to (i) the minimization of the IS of the portfolio if 1R

L

; and (ii) the maximization of the IS

of the portfolio if 1R

L

.

Proof: Denote N

n nnxy as the portfolio (random variable). The price of (any) portfolio is

p=E[y]. It is easy to see that it is optimal for the agent to buy a portfolio with E[y]=m, i.e.

invest all his t=0 endowment. Proposition 8 shows

]0,max[],min[ mymyEEURL

mL

)(LR

where m is the expected

payoff and π the IS of the portfolio. It is easy to see that in case (i) among all portfolios with

32

the same expected payoff, the portfolio with the minimal IS maximizes EU. In case (ii) the

portfolio with the maximal IS maximizes EU. QED

Proposition 10 shows that if 1R

L

, a save asset (portfolio) is the most desirable asset since

the agent cares more about low payoff states or downside risks. If 1R

L

, the agent is more

interested in high payoff states and thus prefers a portfolio that minimizes the probability of

obtaining payoffs with N

n nnxy <m. He prefers a kind of digital options with positive

payoff starting at level m. If 1R

L

, then IS does not matter for expected utility maximization.

C. A Trade-off Between Expected Return and Information Sensitivity

In this section we consider the following thought experiment. Suppose the agent has an

endowment of m units of t=0 goods, a linear reference point utility function and can buy a

portfolio with expected payoff m at t=1. We ask what is the price the agent is willing to pay

for that portfolio at t=0. Fixing an expected payoff m, we still have RL , denoted by .

Denote the expected gross return of portfolio y by p

yER ][ . The kink of the utility function is

at R=1.

Proposition 11: An agent with a linear reference point utility function faces the following

trade-off between expected return and IS. Along an indifference curve: (i) If 1R

L

, then

0d

dR . (ii) If 1R

L

, then 0d

dR . (iii) If 1R

L

, then 0d

dR .

Proof:

The expected utility at t=1 is RRLLmEU )( . The agent is indifferent between

consuming m at t=0 and owning the security x, if

)()()(!

mEUmmxEU LRRLL . This requires that 0 LLRR or

LR R

L

. Along an indifference curve, 1

L

R

d

d

, since 1

R

L

. Lemma 1 shows that if the

expected payoff of x equals the price (i.e. E[x]=p), then RL . If LR then E[x]>p.

Define R=E[x]-p. Since 1L

R

d

d

, this implies that 0

LddR . Note, the expected net return is

33

pR

p

pxEr

][. So 0

Lddr since the price p needs to decrease in order to make the investor

indifferent. QED

Proposition 11 shows that expected return and IS are “complements” if 1R

L

(i.e. when

downside risk is perceived as more important). In other words, along an indifference curve, if

an agent bears more IS the agent requires a higher expected return. On the other hand, if

1R

L

and the agent cares more about potential upside gains, then an agent is willing to

accept less expected return for holding a portfolio with higher IS. If 1R

L

, then IS does not

matter for expected utility maximization and the agent only cares about expected return.

D. Asset Pricing and Information Sensitivity

In this section we derive an equilibrium asset pricing model with a representative agent who

has a linear reference point utility function and wealth m. There are one riskless asset (i.e.

IS=0) and N risky asset where F is the joint distribution of the N risky assets and Fi is the

marginal distribution of asset i. All assets have the same (normalized) expected payoff m. The

gross expected utility for holding the riskless asset is rfLrfpmmxEU )( and for the

other assets, Li

mmxEU )(iLRi

p )( . The agent is indifferent between

consumption at t=0 and buying the riskless if mpLrf

. The agent is indifferent between

holding the riskless asset and asset i if EU(xrf)=EU(xi), i.e. )(LRirfi

pp . The agent

is indifferent between holding asset i and j if EU(xi)=EU(xj), i.e.

iLRijjpp ))(( . Substitution yields )(

LRjrfjpp . In an economy

with N risky assets, we need to calculate the contribution of asset i to the IS of the market

portfolio of risky assets. For a two asset economy, this leads to the next Proposition.

Proposition 12: Consider a representative agent economy with two assets (one riskless (rf)

and one risky (rk) asset, the market portfolio) and where the agent has a linear reference point

utility. For an expected consumption of one unit of t=1 good, the equilibrium prices are given

as follows: L

rfp

1 and )(

LRrfrkpp where π is the IS of the risky asset.

34

This proposition has some potential implications for time varying asset pricing. If the

marginal investor has a linear reference point utility function and R

L

depends on the state of

the economy, then equilibrium expected return (premium) depends on the state of the

economy. We think that in an economic recession 1R

L

since in distressed situations agents

typically care more about “liquidity”, i.e. payoffs in low payoff states. Therefore, an asset

with low IS has a lower expected return or higher price. In contrast during an economic boom

period agents are less cash constraint and less concerned about the left tail risk but are more

interested in potential upside gains. In this case an agent is willing to pay a higher price for a

higher IS asset and thus accepts a lower expected return.

If we add information acquisition and potential adverse selection, we may get a richer set of

implications. However, this would require the assumption of a market microstructure model

and whether and how private information is aggregated.

8. Conclusion

A financial security is characterized by the distribution of its payoff return and stochastic

moments. We introduce a new characteristic of a security, its “information sensitivity” (IS).

IS has two components, one component measures a security’s expected monetary loss in low

payoff states relative to its price and the other component measures the expected monetary

profit in high payoff states. We characterize IS and illustrate its usefulness with several

applications.

We show that IS captures an agent’s incentive to acquire information in a trading context.

Using this measure, we solve a security design problem where an uninformed buyer wants to

buy a security and faces a seller who can acquire costly information about the final payoff of

the security. We show that debt is an optimal security for an uninformed buyer to purchase

and there is never endogenous adverse selection in equilibrium even if the information cost is

vanishingly small. The buyer either reduces the amount of debt to purchase or bribe the seller

not to acquire information by paying a price higher than the expected payoff of debt.

Using IS, we derive the optimality of securitization. In addition, we use IS to analyze optimal

portfolio choice and asset pricing and show that it is a sufficient statistic for expected utility

maximization and IS is a pricing factor if the agents have a liner reference point utility.

35

Several open questions remain. E.g. is IS a useful measure to solve a broader class of

problems in optimal contracting setting with endogenous information and is it useful in

mechanism design with endogenous type space? Is IS a good approximation for expected

utility maximization if an agent has general concave utility functions? How can we

empirically calculate IS? Further extensions and analyses in these directions look promising,

especially that of empirical nature.

36

References

Aghion, Philippe and Patrick Bolton (1992), “An Incomplete Contracts Approach to Financial

Contracting,” Review of Economic Studies 59, 473-494.

Bergemann, Dirk and Juuso Valimaki (2002), “Information Acquisition and Efficient

Mechanism Design,” Econometrica 70(3), 1007-1033.

Biais, Bruno and Thomas Mariotti (2005), "Strategic Liquidity Supply and Security Design,"

Review of Economic Studies, vol. 72(3), 615-649.

Che, Yeon-Koo, and Jinwoo Kim (2010), “Bidding with Securities: Comment,” American

Economic Review 100(4), 1929-35.

Cremer, Jacques and Fahad Khalil (1992), “Gathering Information before Signing a

Contract,” American Economic Review 82(3), 566-78.

Dang, Tri Vi, Gary Gorton, and Bengt Holmström (2012), “Ignorance, Debt and Financial

Crises,” working paper.

Dang, Tri Vi, Gary Gorton, and Bengt Holmström (2012a), “Haircuts and Repo Chains,”

working paper.

DeMarzo, Peter (2005), “The Pooling and Tranching of Securities: A Model of Informed

Intermediation,” Review of Financial Studies 18(1), 1-35.

DeMarzo, Peter and Darrell Duffie (1999), “A Liquidity-Based Model of Security Design,”

Econometrica 67(1), 65-99.

DeMarzo, Peter, Ilan Kremer and Andrzej Skrzypacz (2005), “Bidding with Securities:

Auctions and Security Design,” American Economic Review 95(4), 936-959.

Gale, Douglas and Martin Hellwig (1985), “Incentive-Compatible Debt Contracts: The One-

Period Problem,” The Review of Economic Studies 52(4), 647-663.

Gorton, Gary and George Pennacchi (1990), “Financial Intermediaries and Liquidity Creation,”

Journal of Finance 45(1), 49-72.

Gorton, Gary and George Pennacchi (1993), “Security Baskets and Index-Linked Securities,”

Journal of Business 66(1), 1-27.

Hirshleifer, Jack (1971), “The Private and Social Value of Information and the Reward to

Inventive Activity,” American Economic Review 61(4), 561-574.

37

Innes, Robert D. (1990), “Limited liability and incentive contracting with ex-ante action

choices,” Journal of Economic Theory 52(1), 45-67,

Kyle, Albert S. (1989), “Informed Speculation with Imperfect Competition,” Review of

Economic Studies 56(3), 317-55.

Kyle, Albert S. (1985), “Continuous Auctions and Insider Trading,” Econometrica 53(6),

1315-35.

Townsend, Robert (1979), “Optimal Contracts and Competitive Markets with Costly State

Verification,” Journal of Economic Theory 21(2), 265-293.